US6996722B1 - Data communications - Google Patents

Data communications Download PDF

Info

Publication number
US6996722B1
US6996722B1 US09/555,839 US55583900A US6996722B1 US 6996722 B1 US6996722 B1 US 6996722B1 US 55583900 A US55583900 A US 55583900A US 6996722 B1 US6996722 B1 US 6996722B1
Authority
US
United States
Prior art keywords
adus
data
customer terminal
keys
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US09/555,839
Other languages
English (en)
Inventor
Ian R Fairman
Robert J Briscoe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB9726934.4A external-priority patent/GB9726934D0/en
Priority claimed from GBGB9812060.3A external-priority patent/GB9812060D0/en
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Assigned to BRITISH TELECOMMUICATIONS PUBLIC LIMITED COMPANY reassignment BRITISH TELECOMMUICATIONS PUBLIC LIMITED COMPANY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BRISCOE, ROBERT J., FAIRMAN, IAN R.
Application granted granted Critical
Publication of US6996722B1 publication Critical patent/US6996722B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/109Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the present invention relates to a data communications system, and in particular to a system using an extensive public network such as the Internet.
  • a method of operating a data communications system comprising:
  • the present invention provides a new approach to the generation of an auditable record of the data received by a customer connected to a data communications network.
  • the data source transmits the data as a series of ADUs.
  • These ADUs are typically application-level entities, and need not correspond to the frame structure, if any, of the transmission layer of the network.
  • the ADUs might correspond, for example, to successive minutes of video delivered from a video server or to individual strokes on a white board in a conferencing application.
  • Each successive ADU is then encrypted.
  • the ADU need not be encrypted in a single operation. It may be broken down into packets before encryption. However, the same key is used to encrypt each packet in any one ADU.
  • each ADU has to be decrypted.
  • a record is kept of the decryption of the ADUs. This record may comprise a count of the number of ADUs decrypted. This record may itself be encrypted. This then provides a verifiable record which can be used, for example, to resolve disputes as to the number of ADUs received in a given time period.
  • the invention includes, but is not limited to, data communications systems in which the ADU's are communicated over, e.g., a federated public data network such as the Internet. It also encompasses systems in which the step of communicating ADU's is carried out, e.g., by physically distributing a data carrier such as a CD-ROM containing the ADU's. It also encompasses both multi-cast and uni-cast data communication systems, and systems in which there is more than one data source communicating data to a particular terminal.
  • the invention it is also applicable in a wide range of contexts, wherever it is necessary control access, and particularly to establish proof of receipt (or of failure to receive) data items.
  • Possible applications include multicast audio/video streams for Video-on-Demand, network radio or surveillance; controlling access to the contents of CD ROMS or other storage media carrying software or multimedia data; controlling access to a set of vouchers giving access to other services; a multicast stream of messages such as stock prices, communications network prices, electricity prices, network management messages, news items, portfolio information, team briefings, standards documents, academic papers, magazines, product reviews, black lists, criminal intelligence, legal precedents, property profiles, pharmaceutical test results etc; a sequence of multicast messages within a network game, virtual world or simulation scenario (e.g. an aptitude exam), possibly just those messages that control access, but also possibly any data messages for which proof of reception is crucial to the fairness of the result of the simulation.
  • a network game, virtual world or simulation scenario e.g. an aptitude exam
  • the invention may also be applied in a community of interest network (COIN) or a virtual private network (VPN), as further described below.
  • COIN community of interest network
  • VPN virtual private network
  • different keys may be used for encryption and decryption of different ADUs.
  • the keys are generated in such a way that it is not practically possible for the customer to predict a key value from previous keys.
  • the record of the decryption of the ADUs may then be derived by storing a count of the number of keys generated at the customer terminal. Other data may also be stored, such as the time of the session and/or the time at which each key is generated.
  • the customer terminal may be a personal computer or any other appropriate device, such as, for example, a Java-enabled mobile cellular telephone.
  • the steps of generating a record are carried out by a secure module located at the customer terminal.
  • the secure module provides a region in the customer terminal which is effectively under the control of the data provider, and which is not readily accessible to the customer.
  • the use of such a secure module further enhances the reliability of the stored record.
  • the secure module may be a software module which executes a cryptographic algorithm. This might be implemented, for example, as a Java program distributed by the operator of the remote data source as part of the process of setting up a session.
  • the secure module should include a dedicated processor and store located within a tamper-proof unit. Examples of such secure modules include smartcard structures, and cryptographic PC cards.
  • the secure module has only a relatively low processing power, as may be the case, for example, when it is a smartcard, then preferably that module is required simply to output the different respective keys. Other processes running in the main part of the customer terminal are then responsible for decrypting the ADUs.
  • the secure module has more processing power, as when, for example, a cryptographic co-processor card is used, then preferably the encrypted ADUs are passed to the secure module and the module generates a key, decrypts the ADUs, and passes the decrypted ADUs out, for example, to an application programme running on the customer terminal. In this case it is not necessary to generate a new key for each ADU since the key is kept within the secure module.
  • the remote data source generates and transmits to the customer terminal a seed value, and the plurality of different keys are generated from the said seed value.
  • a fresh seed value may be used for each session.
  • the ADUs from the remote data source may be multicast to a plurality of different customer terminals.
  • seed values for the generation of the plurality of different keys are distributed to the plurality of terminals.
  • a digital watermark that is a characteristic variation in the data
  • This variation may be generated directly in or subsequently to the said step of decrypting the ADUs or a watermarked key may be supplied to decrypt the ADU.
  • the characteristic variation in the key automatically results in a traceable variation in the data decrypted using the key.
  • Digital watermarking is a well-known technique whereby, for example, insignificant bits of a digital data stream may be varied in a characteristic fashion traceable separately to each party receiving the data. If the data is then copied and passed on, the secondary source can be identified by inspecting the insignificant bits.
  • the use of digital watermarking is particularly valuable in the context of the present invention, since it facilitates detection of attempts to undermine the security of the system by collusion between two or more customers, for example by one customer decrypting and retransmitting ADUs.
  • a data communication system comprising:
  • the record in the store is authenticated, for example, using a cryptographic signature.
  • a method of operating a data communications system comprising:
  • the invention also encompasses customer terminals and data servers adapated for implementing the invention in any of its aspects.
  • FIG. 1 is a schematic of a data communication system embodying the network
  • FIG. 2 is a schematic showing in further detail the functional components of the customer terminal in the system of FIG. 1 ;
  • FIG. 3 is a flow diagram showing the principal phases of operation of the system of FIG. 1 ;
  • FIG. 4 is a flow diagram showing in further detail the verification phase
  • FIG. 5 is a flow diagram showing in further detail the initialisation phase
  • FIG. 6 is a flow diagram showing in further detail the received/decrypt phase
  • FIG. 7 is a flow diagram showing in further detail the receipt phase
  • FIG. 8 shows an alternative embodiment
  • FIG. 9 shows a software architecture for a customer terminal.
  • a data communications system includes a data server 1 connected via a data communications network 2 to a number of customer terminal 3 .
  • the data communications network 2 is the public Internet and is formed from a number of sub-networks 2 a – 2 d .
  • the sub-networks and the associated routers support IP (Internet Protocol) multicasting.
  • the data server 1 is a video server.
  • the data server reads a video data stream from a mass storage device and compresses the data using an appropriate compression algorithm such as MPEG 2.
  • An encryption module in the data server 1 then divides the compressed video data stream into ADUs.
  • each ADU may comprise data corresponding to one minute of the video signal.
  • An encryption algorithm then encrypts the ADUs.
  • Suitable encryption algorithms include DES (Data Encryption Standard) (US Federal Standard FIPS PUB46). This is a conventional private key algorithm.
  • a common encryption algorithm is used for all of the ADUs in one session. In this embodiment, a sequence of keys is used, with a different key for each successive ADU.
  • the ADU referred to in this embodiment is an application-level entity created for the purposes of encryption and is to be distinguished from conventional video “frames”).
  • incoming ADUs are processed with the aid of a secure module 4 .
  • the secure module 4 generates a sequence of keys corresponding to those used originally to encrypt the ADUs.
  • the keys may be passed out to the main processor of the customer terminal to allow the data to be decrypted.
  • the secure module itself may carry out the step of decryption.
  • the secure module stores a record of the decryption of the ADUs. This record may comprise, for example, a count of the total number of keys issued in the course of a session and hence of the number of ADUs decrypted, together with a session ID and a record of the time of the session. Any ADUs arriving too late or corrupted may be discarded without decryption or without requesting a key to decrypt them.
  • a customer terminal 3 may have contracted with the operator of the data network 2 for a quality of service (QoS) which requires a specified minimum number of ADUs to be delivered per unit time. If subsequently, congestion in the network 2 causes the rate of ADU delivery to fall below that specified in the contract, then the customer terminal 3 requests from the data server 1 a refund of charges for the session. To validate this request, the data server 1 requests from the secure module 4 a “receipt”. This receipt includes the data recorded in the data store and so provides a tamper-proof indication of the number of ADUs decrypted and made available to the customer in the course of a specified session.
  • QoS quality of service
  • this receipt will only be trusted by the party encrypting the data, not a party such as the network operator simply transmitting data encrypted without its knowledge.
  • the encryption software used by the data source may be certified by a third party trusted by both the network provider and the data source. If the decryption software is also certified by this trusted third party as described below, it may then sign the receipt on behalf of the trusted third party so that the network operator can trust it.
  • FIG. 2 shows the principal functional components of the customer terminal relevant to the present exemplary embodiment.
  • a network interface 22 communicates ADUs to and from the data network.
  • the ADUs pass from the interface 22 to a secure module 23 .
  • the secure module 23 has sub-modules comprising a decryption module D a key generation module K and a secure store S.
  • the key generation module passes a series of keys to the decryption module which decrypts a series of ADUs received from the interface 22 and passes these to an application layer module 24 . This carries out further processing and passes the resulting data to output device, which in this example is a video display unit VDU 25 .
  • the interface 22 may be embodied in hardware by an ISDN modem and in software by a TCP-IP stack.
  • the secure module 23 may be, for example, a smartcard which is interfaced to the customer terminal via a PCMCIA socket. Suitable smartcards are available commercially from Gemplus and other companies. The smartcard may use one of a number of standard data interfaces such as the Java card API (application programmer's interface) of Sun Microsystems, or the Microsoft smartcard architecture.
  • the secure module may be embodied by a PCI cryptographic co-processor card such as that available commercially from IBM.
  • FIG. 9 illustrates a software architecture for the customer terminal.
  • the application layer on the terminal is supported by a decrypting data channel which in turn overlies a data channel layer connected e.g. to a network.
  • the decrypting data channel has associated with a decrypter module.
  • This decrypter module calls resources in a secure module (shown within dashed box) comprising a receipting key generator a key generator, and a receipt store.
  • a secure module shown within dashed box
  • the receipt store may be outside the secure module.
  • FIG. 3 shows the main phases in the operation of the system described above.
  • the server verifies that the secure module in the customer terminal is trustworthy and has a recognised identity.
  • the secure module is initialised to decode data for a particular session.
  • the data is transmitted and decryption carried out and in stage P 4 , which is optional, a receipt is generated.
  • phase P 1 the server carries out steps to confirm that the smartcard does indeed come from a trusted supplier. The steps of phase P 1 are shown in FIG. 4 .
  • step S 1 the server generates a random string.
  • step S 2 the server sends the random string via the data network to the customer terminal.
  • step S 3 the random data string is passed to the secure module (e.g. the smartcard).
  • step S 4 the smartcard signs the random string with its private key.
  • step S 5 the smartcard returns the signed string together with its relevant public key (which has itself been signed by the trusted third party) to the client application running on the customer terminal.
  • step S 6 that client application returns the signed string and the signed public key via the data communications network to the server.
  • step S 7 the server verifies the signed random string.
  • the server first generates (s 51 ) a seed value for use with an appropriate pseudo-random or chaotic function to generate a series of keys. It also generates a session key (s 52 ). The server encrypts the seed value using the secure module's public key (s 3 ). It then transmits the encrypted seed value and the session key to the customer terminal (s 54 ). The client application passes the encrypted seed value and session key on to the secure module (s 55 ). The secure module decrypts the seed value and session key with its private key. The secure module sets an ADU counter to zero (s 56 ) and initialises a sequence generator with the seed value (s 57 ). The customer terminal is then ready to receive and decrypt ADUs.
  • the server subsequently sends a series of ADUs to the client.
  • Each ADU has an ADU number.
  • Each ADU might also have a session key transmitted with it.
  • the sequence of steps for the nth ADU is illustrated in FIG. 6 .
  • the server sends the encrypted nth ADU to the client.
  • the client requests the key x for ADU n from the secure module (s 62 ).
  • the secure module records the request (s 63 ).
  • the smartcard then returns the key x to the client (s 64 ).
  • the client deciphers the ADU using x (s 65 ).
  • the client tests to determine whether the ADU is the last of a session (s 66 ). If not then the steps are iterated for the n+1th and subsequent ADUs.
  • the record of the request may simply be stored as a single incrementing counter. However, some stringent scenarios may require audit trails where each detailed record of receipt is stored. If the list of records becomes too large to be stored on the smartcard, it can be hashed and the hash and the time can then be signed using the smartcard's private key, the record, hash and signature then being passed to the client for storage.
  • the hash of the previous records can be retrieved from the client by the smartcard, and, having checked the signature of the previous hash is valid, the hash can be prepended to the new records, a new hash generated from the combined new records and old hash, then the new records and new hash can be appended to the old records on the client followed by the digital signature of the new hash.
  • the length of each chunk of hashed records would have to be known by the data source in order to check the signature on the receipt. This may be by a convention, or by including it in a header to the receipt.
  • the customer In setting up the session, the customer has previously negotiated an agreement with the service provider as to the QoS level for the session. For an application such as video on demand this level may be stringent: for example the customer may require that no application-level ADU is lost in transmission. If a ADU arrives too late at the client, it can can be discarded and is effectively considered to have been lost. If then this QoS level is not met, then the customer requests a refund from the service provider. The request for refund might specify, for example, that there was ADU loss at a specified time into the video transmission. In processing such a request, the server requires a receipt from the customer. As shown in FIG. 7 , in step s 71 the client requests a receipt for a specified session s from the secure module.
  • the secure module reads the data which it recorded for that session and generates a receipt containing that data (s 72 ).
  • the secure module signs the receipt with the secure module's private key (s 73 ).
  • the secure module returns the signed receipt to the client (s 74 ).
  • the secure module may have already signed and stored its receipts on the client terminal if it was short of storage space as described above.
  • the secure module The client in turn transmits the signed receipt to the server (s 75 ).
  • the server checks the signature on the receipt using the public key of the secure module (s 76 ).
  • the public key may be read from a database stored at the server. Having verified the signature, the server can then check the customers claim for a refund using the data contained in the receipt. This data may show, for example, a discrepancy between the number of ADUs decrypted in a session and the number transmitted by the server, thereby substantiating the customer's claim that a ADU was lost.
  • the ADU's may be decrypted in such a way that at each one of a number of customer terminals a different characteristic variation is present in the data.
  • This variation may be generated directly in the said step of decrypting the ADUs or a watermarked key may be supplied to decrypt the ADU.
  • the characteristic variation in the key automatically results in a traceable variation in the data decrypted using the key.
  • watermarked keys is described, for example, in Ross Anderson, “Chameleon—A New Kind of Stream Cipher Encryption” in Haifa in Jan. 1997.
  • the operator of the data server may subsequently use the watermark, for example, to identify the secondary source of data copied and forwarded by one customer terminal to another.
  • the data server inspects the data and compares the characterstic variations with data stored on the server that correlates the variations with respective customer terminals.
  • the watermark may be used to detect collusion where one customer forwards keys for ADU decryption to another.
  • the ADU's are communicated over a network
  • distribution is effected using a data carrier such as CD-ROM or some other portable storage medium.
  • a data carrier such as CD-ROM or some other portable storage medium.
  • the set up of the secure module on a smart card at the customer location is carried out as before—over the Internet.
  • the data on the distribution medium is separated into ADUs, each with a sequence number and each encrypted with different keys as before.
  • the smart card generate keys, which could all be achieved off-line.
  • the request for a receipt and the response are carried out on-line via the Internet or other appropriate communications network as before.
  • each source of information would split its data into ADUs and transmit each ADU encrypted with different keys across the COIN.
  • the same ADU would always be transmitted with under the same key no matter how many times it was transmitted to different parties within the COIN.
  • Sources of information might be direct, such as the parties involved in the COIN or indirect such as Web servers or caches commonly accessible to all parties within the COIN.
  • the information would be sent to the Web server or cache with its sequence number in the clear but data encrypted. It would be stored in the same encrypted form as it had been first transmitted. Only when the final recipient accessed the Web server or cache would their smart card generate the key for decryption and record receipt of the information.
  • the watermarking techniques described previously could be used if tracing of who was passing on decrypted data was required.
  • FIG. 8 shows a further alternative embodiment, in which multiple data sources 1 , 1 a communicate data to the customer terminals.
  • multiple data sources may include many more sources.
  • the system may include many more sources.
  • multiple sources are generating data, it is possible to use the invention on a per-source basis, with each receiver entering into the setup phase with each source.
  • this becomes unscalable and time-consuming.
  • a sequence id of any ADU arriving at any receiver consists of two parts, the sender id and the per-sender sequenceid.
  • the sender id may be its IP address and port number, in which case these would already be in the header of each packet.
  • the sender id acts as an offset to the primary seed to produce a secondary seed (e.g. by XORing it with the seed).
  • each smart card operates as many key sequences as it hears senders, each sequence effectively seeded from the same primary seed, but then offset to a secondary seed before starting each sequence in a similar way to the pseudo-random or chaotic seqences described below.
  • the sender id Whenever an ADU arrives, the sender id is examined to look-up the correct sequence, then the sequence id allows the correct key to be generated. This allows each receiver to only pass through the set up once for all senders in a multi-sender session.
  • the session initiator generates the primary seed and passes it to each sender using regular cryptograpic privacy (e.g. under the public key of each sender).
  • Each sender offsets the primary seed with their own id to produce their secondary seed, which they would use to start the key sequence for ADUs they sent.
  • Any sender may take any receiver through the setup phase by passing it the primary seed, assuming there is some way for any sender to establish who was an authorised receiver (e.g. a list supplied and signed by the session initiator, or a token the initiator gave to each receiver in return for payment, which each receiver had to reveal to any sender).
  • authorised receiver e.g. a list supplied and signed by the session initiator, or a token the initiator gave to each receiver in return for payment, which each receiver had to reveal to any sender.
  • the sequence used for generating the keys in the above examples may be distributed to customers terminals using HTTP (hypertext transfer protocol) as Java code.
  • a chaotic function such as this has the property that any errors in the value of xn grow exponentially as the function is iterated.
  • the secure module uses a higher accuracy internally than the accuracy of the key values exposed to the client. For example the secure module may use 128-bit numbers internally and then only return to the client the most significant 32 bits. In generating the key values, the chaotic function is iterated until the error in the value returned to the client grows bigger than the range. This then prevents the user guessing the sequence from the values returned by the secure module.
  • a different function may be used for each session. This serves to further reduce the possibility of the customer predicting sequence values.
  • Table 1 below list Java code for implementing a chaotic function. It returns the next number in a sequence, or the nth number in a sequence.
  • the binary values of the ADU identity might be used to select which of a pair of functions is used to operate on the seed value.
  • Preferably a pair of computationally symmetric functions are used. For example, right or left-shifted XOR (exclusive OR) operations might be selected depending on whether a binary value is 1 or 0. If we label these functions A and B respectively, then, e.g., ADU number six, i.e. 110, has a key generated by successive operations AAB on the seed value.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Communication Control (AREA)
  • Mobile Radio Communication Systems (AREA)
US09/555,839 1997-12-19 1998-12-15 Data communications Expired - Lifetime US6996722B1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
GBGB9726934.4A GB9726934D0 (en) 1997-12-19 1997-12-19 Data communications
EP97310358 1997-12-19
GBGB9812060.3A GB9812060D0 (en) 1998-06-04 1998-06-04 Data communications
EP98304429 1998-06-04
PCT/GB1998/003755 WO1999033224A1 (en) 1997-12-19 1998-12-15 Data communications

Publications (1)

Publication Number Publication Date
US6996722B1 true US6996722B1 (en) 2006-02-07

Family

ID=27443574

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/555,929 Expired - Fee Related US7209560B1 (en) 1997-12-19 1998-12-15 Data communications
US09/555,839 Expired - Lifetime US6996722B1 (en) 1997-12-19 1998-12-15 Data communications

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/555,929 Expired - Fee Related US7209560B1 (en) 1997-12-19 1998-12-15 Data communications

Country Status (8)

Country Link
US (2) US7209560B1 (de)
EP (2) EP1040630B1 (de)
JP (2) JP2001527333A (de)
CN (1) CN1200534C (de)
AU (2) AU760045B2 (de)
CA (2) CA2313242C (de)
DE (2) DE69825479T2 (de)
WO (2) WO1999033224A1 (de)

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030031320A1 (en) * 2001-08-09 2003-02-13 Fan Roderic C. Wireless device to network server encryption
US20030165240A1 (en) * 2002-03-04 2003-09-04 Bantz David F. Decryption system for encrypted display
US20040250077A1 (en) * 2003-06-04 2004-12-09 Samsung Electronics Co., Ltd. Method of establishing home domain through device authentication using smart card, and smart card for the same
US20050143085A1 (en) * 2003-12-30 2005-06-30 Hao Bi Broadcast/multicast services in wireless communications networks and methods
US20060072748A1 (en) * 2004-10-01 2006-04-06 Mark Buer CMOS-based stateless hardware security module
US20060072762A1 (en) * 2004-10-01 2006-04-06 Mark Buer Stateless hardware security module
US20070234268A1 (en) * 2004-07-29 2007-10-04 Wolfgang Roesner Method, system and program product for providing a configuration specification language supporting selective presentation of configuration entities
US20080021691A1 (en) * 2004-07-29 2008-01-24 Wolfgang Roesner Method, system and program product supporting presentation of a simulated or hardware system including configuration entities
US20080065892A1 (en) * 2006-02-03 2008-03-13 Bailey Daniel V Authentication Methods and Apparatus Using Pairing Protocols and Other Techniques
US7383582B1 (en) * 2002-08-02 2008-06-03 Federal Network Systems, Llc Systems and methods for performing electronic surveillance
US7512664B1 (en) * 1999-01-28 2009-03-31 Texas Instruments Incorporated System and method for loading resolved java class files to a client device
US20090138719A1 (en) * 2006-01-20 2009-05-28 Matthias Franz Method, Apparatus, Computer Program, Data Storage Medium and Computer Program Product For Preventing Reception of Media Data From a Multicast Service by an Unauthorized Apparatus
US20100235624A1 (en) * 1999-03-30 2010-09-16 Sony Corporation Method and apparatus for protecting the transfer of data
US20100295021A1 (en) * 2009-05-21 2010-11-25 International Business Machines Corporation Single Gate Inverter Nanowire Mesh
US20130145150A1 (en) * 2000-09-21 2013-06-06 Research In Motion Limited Code signing system and method
US8488788B2 (en) 1999-11-09 2013-07-16 Sony Corporation Method for simulcrypting scrambled data to a plurality of conditional access devices
US8712883B1 (en) * 2006-06-12 2014-04-29 Roxbeam Media Network Corporation System and method for dynamic quality-of-service-based billing in a peer-to-peer network
US9077524B2 (en) 2005-09-29 2015-07-07 Blackberry Limited System and method for providing an indication of randomness quality of random number data generated by a random data service
US9628875B1 (en) * 2011-06-14 2017-04-18 Amazon Technologies, Inc. Provisioning a device to be an authentication device
US9639825B1 (en) 2011-06-14 2017-05-02 Amazon Technologies, Inc. Securing multifactor authentication
US10305880B2 (en) * 2001-05-11 2019-05-28 Kount Inc. System for secure enrollment and secure verification of network users by a centralized identification service
US10304047B2 (en) * 2012-12-07 2019-05-28 Visa International Service Association Token generating component
US10452642B1 (en) * 2015-03-20 2019-10-22 Tintri By Ddn, Inc. Detecting and pinpointing data corruption
US10615969B1 (en) * 2017-02-10 2020-04-07 Wells Fargo Bank, N.A. Database encryption key management
US10615970B1 (en) * 2017-02-10 2020-04-07 Wells Fargo Bank, N.A. Secure key exchange electronic transactions
US10717264B2 (en) 2015-09-30 2020-07-21 Sigma Labs, Inc. Systems and methods for additive manufacturing operations
US20200265158A1 (en) * 2015-12-29 2020-08-20 EMC IP Holding Company LLC Secrets as a service
US11135654B2 (en) 2014-08-22 2021-10-05 Sigma Labs, Inc. Method and system for monitoring additive manufacturing processes
US11267047B2 (en) 2015-01-13 2022-03-08 Sigma Labs, Inc. Material qualification system and methodology
US11478854B2 (en) 2014-11-18 2022-10-25 Sigma Labs, Inc. Multi-sensor quality inference and control for additive manufacturing processes

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7209560B1 (en) * 1997-12-19 2007-04-24 British Telecommunications Public Limited Company Data communications
EP1075108A1 (de) * 1999-07-23 2001-02-07 BRITISH TELECOMMUNICATIONS public limited company Kryptographische Datenverteilung
FR2799078A1 (fr) * 1999-09-27 2001-03-30 Jacky Montiel Ensemble de protocoles permettant l'authentification rapide pour des systemes transactionnels de commerce d'informations et de services sur internet
WO2001082033A1 (de) * 2000-04-19 2001-11-01 Syntion Ag Verfahren zur abrechnungsfähigen erfassung der nutzung eines computerprogramms
US6983259B1 (en) 2000-06-23 2006-01-03 Ebs Group Limited Anonymous trading system
US7333952B1 (en) 2000-06-23 2008-02-19 Ebs Group Limited Compound order handling in an anonymous trading system
US7184982B1 (en) 2000-06-23 2007-02-27 Ebs Group Limited Architecture for anonymous trading system
US7366690B1 (en) 2000-06-23 2008-04-29 Ebs Group Limited Architecture for anonymous trading system
US7827085B1 (en) 2000-06-23 2010-11-02 Ebs Group Limited Conversational dealing in an anonymous trading system
SE517116C2 (sv) * 2000-08-11 2002-04-16 Ericsson Telefon Ab L M Metod och anordning för säkra kommunikationstjänster
WO2002054708A2 (en) * 2001-01-02 2002-07-11 Tranz-Send Broadcasting Network, Inc. System and method for providing load balanced secure media content and data delivery in a distributed computed environment
EP2824868A1 (de) * 2001-08-24 2015-01-14 Thomson Licensing Lokales digitales Netz, Verfahren zum Einbau neuer Vorrichtungen sowie Datenübertragungs- und Datenempfangsverfahren in einem solchen Netz
GB0124686D0 (en) * 2001-10-15 2001-12-05 Hewlett Packard Co A scheme for splitting trusted authorities based on the shamir's secret sharing
JP2003216037A (ja) 2001-11-16 2003-07-30 Yazaki Corp 暗号キー、暗号化装置、暗号化復号化装置、暗号キー管理装置及び復号化装置
US7600038B2 (en) 2002-12-04 2009-10-06 Certicom Corp. Method and apparatus for encoding security status information
US7890758B2 (en) * 2003-03-27 2011-02-15 International Business Machines Corporation Apparatus and method for generating keys in a network computing environment
US20070172066A1 (en) * 2003-09-12 2007-07-26 Secured Email Goteborg Ab Message security
SE0400238D0 (sv) * 2003-09-12 2004-02-04 Secured Email Ab Message security
US8060745B2 (en) 2003-12-16 2011-11-15 Seiko Epson Corporation Security for wireless transmission
US7548620B2 (en) * 2004-02-23 2009-06-16 Verisign, Inc. Token provisioning
US8774860B2 (en) * 2005-04-05 2014-07-08 Nokia Corporation Method and device for low-power FM transmission of audio data to RDS capable FM radio receiver
US8775792B2 (en) * 2005-06-10 2014-07-08 Strue, Inc. Method of and system for encryption and authentication
JP5060081B2 (ja) * 2006-08-09 2012-10-31 富士通株式会社 フレームを暗号化して中継する中継装置
US20080046731A1 (en) * 2006-08-11 2008-02-21 Chung-Ping Wu Content protection system
US20110023070A1 (en) * 2006-10-11 2011-01-27 Nokia Corporation Service Discovery in Broadcast Networks
JP2008104040A (ja) * 2006-10-20 2008-05-01 Fujitsu Ltd 共通鍵生成装置および共通鍵生成方法
US8655351B2 (en) * 2006-11-23 2014-02-18 Nokia Corporation Method and device for maintaining continuity of radio transmissions
KR100848642B1 (ko) * 2007-02-22 2008-07-28 고려대학교 산학협력단 영상 프레임을 암호화하는 방법과 복원하는 방법
US20080250251A1 (en) * 2007-04-04 2008-10-09 Cyberlink Corp. Systems and Methods for Hardware Driven Program Execution
US9209982B2 (en) * 2007-05-18 2015-12-08 Cisco Technology, Inc. Charging for network services based on delivered quality of service
CN101321209B (zh) * 2008-06-19 2011-11-16 上海软中信息技术有限公司 基于pstn的安全通信分布式数据提取方法及实现系统
US20120014374A1 (en) * 2010-07-13 2012-01-19 Yaniro Jr Daniel J Method, Device, and Computer Program Product for Adaptive Routing of Communications Across One or More Networks
CN103220280A (zh) * 2013-04-03 2013-07-24 天地融科技股份有限公司 动态口令牌、动态口令牌数据传输方法及系统
CN104796397B (zh) * 2015-01-08 2017-09-19 北京思普崚技术有限公司 一种数据加密发送的方法
CN105262583A (zh) * 2015-09-07 2016-01-20 安徽问天量子科技股份有限公司 基于pstn公网的量子数据终端组网系统及多方会话的实现方法
US9887771B2 (en) 2015-10-23 2018-02-06 International Business Machines Corporation Bandwidth throttling
US9882807B2 (en) * 2015-11-11 2018-01-30 International Business Machines Corporation Network traffic classification
US9853741B2 (en) * 2015-11-30 2017-12-26 International Business Machines Corporation Fiber optic encryption
CN110557244B (zh) * 2019-09-06 2021-12-28 江苏省水文水资源勘测局 一种水利工业控制系统中应用数据单元加密方法
US20230318982A1 (en) * 2022-03-29 2023-10-05 Qualcomm Incorporated Application data unit architecture and signaling

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5148485A (en) 1990-07-20 1992-09-15 Ericsson Ge Mobile Communications Holding, Inc. Encrypton system for digital cellular communications
EP0528730A1 (de) 1991-08-19 1993-02-24 France Telecom Verfahren zum Senden und Empfangen von personalisierten Programmen
EP0534419A2 (de) 1991-09-27 1993-03-31 International Business Machines Corporation Schlüsselverwaltung für Geheimübertragungssystem mit öffentlichem Schlüssel auf Grundlage von Steuervektoren
WO1993009627A1 (en) 1991-11-08 1993-05-13 Ernest Stewart Lee Cryptographic apparatus and method for a data communication network
US5467134A (en) 1992-12-22 1995-11-14 Microsoft Corporation Method and system for compressing video data
US5483598A (en) 1993-07-01 1996-01-09 Digital Equipment Corp., Patent Law Group Message encryption using a hash function
US5544161A (en) * 1995-03-28 1996-08-06 Bell Atlantic Network Services, Inc. ATM packet demultiplexer for use in full service network having distributed architecture
US5584023A (en) 1993-12-27 1996-12-10 Hsu; Mike S. C. Computer system including a transparent and secure file transform mechanism
WO1997026611A1 (en) 1996-01-16 1997-07-24 Hughes Aircraft Company Deferred billing, broadcast, electronic document distribution system and method
US5652868A (en) 1994-09-27 1997-07-29 International Business Machines Corporation Data processor having BIOS decryption of emulated media images
WO1997034426A2 (en) 1996-02-28 1997-09-18 Encanto Network, Inc. Intelligent communication device
US5710815A (en) 1995-06-07 1998-01-20 Vtech Communications, Ltd. Encoder apparatus and decoder apparatus for a television signal having embedded viewer access control data
US5787179A (en) 1995-12-07 1998-07-28 Fujitsu Ltd. Scrambling and descrambling of data with improved security
US5937067A (en) 1996-11-12 1999-08-10 Scientific-Atlanta, Inc. Apparatus and method for local encryption control of a global transport data stream
US6055314A (en) * 1996-03-22 2000-04-25 Microsoft Corporation System and method for secure purchase and delivery of video content programs
US6222924B1 (en) 1996-01-30 2001-04-24 Oy Nokia Ab Scrambling of digital media objects in connection with transmission and storage
US6351538B1 (en) 1998-10-06 2002-02-26 Lsi Logic Corporation Conditional access and copy protection scheme for MPEG encoded video data
US6580906B2 (en) 1997-12-10 2003-06-17 Intel Corporation Authentication and security in wireless communication system

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06216897A (ja) * 1993-01-20 1994-08-05 Nippon Signal Co Ltd:The データ送受信装置
US5748763A (en) * 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
JPH088853A (ja) * 1994-06-24 1996-01-12 Sony Corp スクランブル装置およびデスクランブル装置
JP3498268B2 (ja) * 1994-09-14 2004-02-16 日本電信電話株式会社 文書通信管理方法
JPH09261217A (ja) * 1996-03-27 1997-10-03 Nippon Telegr & Teleph Corp <Ntt> 通信装置及びその方法
US5852664A (en) * 1995-07-10 1998-12-22 Intel Corporation Decode access control for encoded multimedia signals
US5991279A (en) * 1995-12-07 1999-11-23 Vistar Telecommunications Inc. Wireless packet data distributed communications system
US5960081A (en) * 1997-06-05 1999-09-28 Cray Research, Inc. Embedding a digital signature in a video sequence
JPH1141245A (ja) * 1997-07-22 1999-02-12 Fujitsu Ltd 秘匿通信システム
GB9717868D0 (en) * 1997-08-23 1997-10-29 Philips Electronics Nv Wireless network
US7209560B1 (en) * 1997-12-19 2007-04-24 British Telecommunications Public Limited Company Data communications
US6285774B1 (en) * 1998-06-08 2001-09-04 Digital Video Express, L.P. System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies
KR100331863B1 (ko) * 1998-11-03 2002-05-09 서평원 네트워크암호화장치및방법
US6570990B1 (en) * 1998-11-13 2003-05-27 Lsi Logic Corporation Method of protecting high definition video signal
US6882729B2 (en) * 2002-12-12 2005-04-19 Universal Electronics Inc. System and method for limiting access to data

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5148485A (en) 1990-07-20 1992-09-15 Ericsson Ge Mobile Communications Holding, Inc. Encrypton system for digital cellular communications
EP0528730A1 (de) 1991-08-19 1993-02-24 France Telecom Verfahren zum Senden und Empfangen von personalisierten Programmen
US5301233A (en) 1991-08-19 1994-04-05 France Telecom Etablissement Autonome De Droit Public Process for the transmission and reception of personalized programs
EP0534419A2 (de) 1991-09-27 1993-03-31 International Business Machines Corporation Schlüsselverwaltung für Geheimübertragungssystem mit öffentlichem Schlüssel auf Grundlage von Steuervektoren
WO1993009627A1 (en) 1991-11-08 1993-05-13 Ernest Stewart Lee Cryptographic apparatus and method for a data communication network
US5467134A (en) 1992-12-22 1995-11-14 Microsoft Corporation Method and system for compressing video data
US5483598A (en) 1993-07-01 1996-01-09 Digital Equipment Corp., Patent Law Group Message encryption using a hash function
US5584023A (en) 1993-12-27 1996-12-10 Hsu; Mike S. C. Computer system including a transparent and secure file transform mechanism
US5652868A (en) 1994-09-27 1997-07-29 International Business Machines Corporation Data processor having BIOS decryption of emulated media images
US5544161A (en) * 1995-03-28 1996-08-06 Bell Atlantic Network Services, Inc. ATM packet demultiplexer for use in full service network having distributed architecture
US5710815A (en) 1995-06-07 1998-01-20 Vtech Communications, Ltd. Encoder apparatus and decoder apparatus for a television signal having embedded viewer access control data
US5787179A (en) 1995-12-07 1998-07-28 Fujitsu Ltd. Scrambling and descrambling of data with improved security
WO1997026611A1 (en) 1996-01-16 1997-07-24 Hughes Aircraft Company Deferred billing, broadcast, electronic document distribution system and method
US6222924B1 (en) 1996-01-30 2001-04-24 Oy Nokia Ab Scrambling of digital media objects in connection with transmission and storage
WO1997034426A2 (en) 1996-02-28 1997-09-18 Encanto Network, Inc. Intelligent communication device
US6055314A (en) * 1996-03-22 2000-04-25 Microsoft Corporation System and method for secure purchase and delivery of video content programs
US5937067A (en) 1996-11-12 1999-08-10 Scientific-Atlanta, Inc. Apparatus and method for local encryption control of a global transport data stream
US6580906B2 (en) 1997-12-10 2003-06-17 Intel Corporation Authentication and security in wireless communication system
US6351538B1 (en) 1998-10-06 2002-02-26 Lsi Logic Corporation Conditional access and copy protection scheme for MPEG encoded video data

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Bottura, Charging and Tariffing Functions and Capabilities for Mans' Proceedings of the Network Operations and Management Symposium (NOM, Memphis, Apr. 6-9, 1992, vol. 1, Jan. 1, 1992, pp. 208-218.
Coffey et al, Non-Repudiation with Mandatory Proof of Receipt: Computer Communications Review, vol. 26, No. 1, Jan. 1, 1996, pp. 6-17, XP000580016.
Popp et al, "Security Service for Telecommunications Users" Bringing Telecommunication Services to the People-ISS & N 1995, Third International Conference on Intelligence in Broadband Service and Networks, Heraklion, Crete, Oct. 16-19, 1995. Proceedings, NO Conf. 3, Oct. 16, 1995, pp. 28-39, XP 000593466.

Cited By (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7512664B1 (en) * 1999-01-28 2009-03-31 Texas Instruments Incorporated System and method for loading resolved java class files to a client device
US20100235624A1 (en) * 1999-03-30 2010-09-16 Sony Corporation Method and apparatus for protecting the transfer of data
US8533459B2 (en) * 1999-03-30 2013-09-10 Sony Corporation Method and apparatus for protecting the transfer of data
US8488788B2 (en) 1999-11-09 2013-07-16 Sony Corporation Method for simulcrypting scrambled data to a plurality of conditional access devices
US20150026457A1 (en) * 2000-09-21 2015-01-22 Blackberry Limited Controlling access by code
US9922175B2 (en) * 2000-09-21 2018-03-20 Blackberry Limited Controlling access by code
US20170076071A1 (en) * 2000-09-21 2017-03-16 Blackberry Limited Controlling access by code
US9507920B2 (en) * 2000-09-21 2016-11-29 Blackberry Limited Controlling access by code
US8984278B2 (en) * 2000-09-21 2015-03-17 Blackberry Limited Code signing system and method
US20130145150A1 (en) * 2000-09-21 2013-06-06 Research In Motion Limited Code signing system and method
US10032007B1 (en) * 2000-09-21 2018-07-24 Blackberry Limited Controlling access by code
US10437967B2 (en) * 2000-09-21 2019-10-08 Blackberry Limited Code signing system and method
US11030278B2 (en) 2000-09-21 2021-06-08 Blackberry Limited Code signing system and method
US10305880B2 (en) * 2001-05-11 2019-05-28 Kount Inc. System for secure enrollment and secure verification of network users by a centralized identification service
US7983419B2 (en) * 2001-08-09 2011-07-19 Trimble Navigation Limited Wireless device to network server encryption
US20030031320A1 (en) * 2001-08-09 2003-02-13 Fan Roderic C. Wireless device to network server encryption
US20030165240A1 (en) * 2002-03-04 2003-09-04 Bantz David F. Decryption system for encrypted display
US7383582B1 (en) * 2002-08-02 2008-06-03 Federal Network Systems, Llc Systems and methods for performing electronic surveillance
US20040250077A1 (en) * 2003-06-04 2004-12-09 Samsung Electronics Co., Ltd. Method of establishing home domain through device authentication using smart card, and smart card for the same
US20050143085A1 (en) * 2003-12-30 2005-06-30 Hao Bi Broadcast/multicast services in wireless communications networks and methods
US20070234268A1 (en) * 2004-07-29 2007-10-04 Wolfgang Roesner Method, system and program product for providing a configuration specification language supporting selective presentation of configuration entities
US20080021691A1 (en) * 2004-07-29 2008-01-24 Wolfgang Roesner Method, system and program product supporting presentation of a simulated or hardware system including configuration entities
US20060072762A1 (en) * 2004-10-01 2006-04-06 Mark Buer Stateless hardware security module
US8160244B2 (en) * 2004-10-01 2012-04-17 Broadcom Corporation Stateless hardware security module
US20060072748A1 (en) * 2004-10-01 2006-04-06 Mark Buer CMOS-based stateless hardware security module
US9077524B2 (en) 2005-09-29 2015-07-07 Blackberry Limited System and method for providing an indication of randomness quality of random number data generated by a random data service
US8745382B2 (en) 2006-01-20 2014-06-03 Siemens Aktiengesellschaft Method, apparatus, computer program, data storage medium and computer program product for preventing reception of media data from a multicast service by an unauthorized apparatus
US20090138719A1 (en) * 2006-01-20 2009-05-28 Matthias Franz Method, Apparatus, Computer Program, Data Storage Medium and Computer Program Product For Preventing Reception of Media Data From a Multicast Service by an Unauthorized Apparatus
US11973862B2 (en) 2006-02-03 2024-04-30 EMC IP Holding Company LLC Authentication methods and apparatus for generating digital signatures
US10958632B1 (en) 2006-02-03 2021-03-23 EMC IP Holding Company LLC Authentication methods and apparatus using key-encapsulating ciphertexts and other techniques
US9923718B2 (en) 2006-02-03 2018-03-20 EMC IP Holding Company LLC Authentication methods and apparatus using base points on an elliptic curve and other techniques
US20080065892A1 (en) * 2006-02-03 2008-03-13 Bailey Daniel V Authentication Methods and Apparatus Using Pairing Protocols and Other Techniques
US8495372B2 (en) * 2006-02-03 2013-07-23 Emc Corporation Authentication methods and apparatus using pairing protocols and other techniques
US8712883B1 (en) * 2006-06-12 2014-04-29 Roxbeam Media Network Corporation System and method for dynamic quality-of-service-based billing in a peer-to-peer network
US20100295021A1 (en) * 2009-05-21 2010-11-25 International Business Machines Corporation Single Gate Inverter Nanowire Mesh
US9628875B1 (en) * 2011-06-14 2017-04-18 Amazon Technologies, Inc. Provisioning a device to be an authentication device
US12113788B2 (en) * 2011-06-14 2024-10-08 Amazon Technologies, Inc. Provisioning a device to be an authentication device
US9639825B1 (en) 2011-06-14 2017-05-02 Amazon Technologies, Inc. Securing multifactor authentication
US10826892B2 (en) 2011-06-14 2020-11-03 Amazon Technologies, Inc. Provisioning a device to be an authentication device
US10304047B2 (en) * 2012-12-07 2019-05-28 Visa International Service Association Token generating component
US11176536B2 (en) 2012-12-07 2021-11-16 Visa International Service Association Token generating component
US11607875B2 (en) 2014-08-22 2023-03-21 Sigma Additive Solutions, Inc. Method and system for monitoring additive manufacturing processes
US11858207B2 (en) 2014-08-22 2024-01-02 Sigma Additive Solutions, Inc. Defect detection for additive manufacturing systems
US11135654B2 (en) 2014-08-22 2021-10-05 Sigma Labs, Inc. Method and system for monitoring additive manufacturing processes
US11478854B2 (en) 2014-11-18 2022-10-25 Sigma Labs, Inc. Multi-sensor quality inference and control for additive manufacturing processes
US11931956B2 (en) 2014-11-18 2024-03-19 Divergent Technologies, Inc. Multi-sensor quality inference and control for additive manufacturing processes
US11267047B2 (en) 2015-01-13 2022-03-08 Sigma Labs, Inc. Material qualification system and methodology
US10452642B1 (en) * 2015-03-20 2019-10-22 Tintri By Ddn, Inc. Detecting and pinpointing data corruption
US12019026B2 (en) 2015-09-30 2024-06-25 Divergent Technologies, Inc. Systems and methods for additive manufacturing operations
US10717264B2 (en) 2015-09-30 2020-07-21 Sigma Labs, Inc. Systems and methods for additive manufacturing operations
US11674904B2 (en) 2015-09-30 2023-06-13 Sigma Additive Solutions, Inc. Systems and methods for additive manufacturing operations
US20200265158A1 (en) * 2015-12-29 2020-08-20 EMC IP Holding Company LLC Secrets as a service
US11494508B2 (en) * 2015-12-29 2022-11-08 EMC IP Holding Company LLC Secrets as a service
US11683158B1 (en) * 2017-02-10 2023-06-20 Wells Fargo Bank, N.A. Database encryption key management
US10615970B1 (en) * 2017-02-10 2020-04-07 Wells Fargo Bank, N.A. Secure key exchange electronic transactions
US11095438B1 (en) * 2017-02-10 2021-08-17 Wells Fargo Bank, N.A. Database encryption key management
US11936776B2 (en) 2017-02-10 2024-03-19 Wells Fargo Bank, N.A. Secure key exchange electronic transactions
US10615969B1 (en) * 2017-02-10 2020-04-07 Wells Fargo Bank, N.A. Database encryption key management
US11601261B1 (en) 2017-02-10 2023-03-07 Wells Fargo Bank, N.A. Secure key exchange electronic transactions
US12047497B2 (en) 2017-02-10 2024-07-23 Wells Fargo Bank, N.A. Database encryption key management
US11184158B1 (en) 2017-02-10 2021-11-23 Wells Fargo Bank, N.A. Secure key exchange electronic transactions

Also Published As

Publication number Publication date
AU1570499A (en) 1999-07-12
WO1999033224A1 (en) 1999-07-01
CN1282475A (zh) 2001-01-31
AU760045B2 (en) 2003-05-08
DE69825479D1 (de) 2004-09-09
DE69827410D1 (de) 2004-12-09
AU759581B2 (en) 2003-04-17
EP1040630A1 (de) 2000-10-04
JP2001527326A (ja) 2001-12-25
JP2001527333A (ja) 2001-12-25
DE69825479T2 (de) 2005-07-28
AU1570599A (en) 1999-07-12
US7209560B1 (en) 2007-04-24
CN1200534C (zh) 2005-05-04
EP1040621A1 (de) 2000-10-04
CA2313242C (en) 2008-10-14
CA2313407C (en) 2007-10-02
EP1040630B1 (de) 2004-11-03
DE69827410T2 (de) 2005-10-27
CA2313407A1 (en) 1999-07-01
EP1040621B1 (de) 2004-08-04
CA2313242A1 (en) 1999-07-01
WO1999033242A1 (en) 1999-07-01

Similar Documents

Publication Publication Date Title
US6996722B1 (en) Data communications
US7725404B2 (en) Secure electronic commerce using mutating identifiers
US7353382B2 (en) Security framework and protocol for universal pervasive transactions
US5960086A (en) Unified end-to-end security methods and systems for operating on insecure networks
US7917946B2 (en) Method and network for securely delivering streaming data
US7706540B2 (en) Content distribution using set of session keys
US5956404A (en) Digital signature with auditing bits
US7389531B2 (en) Method and system to dynamically present a payment gateway for content distributed via a network
US6993137B2 (en) Method and system to securely distribute content via a network
US7415721B2 (en) Separate authentication processes to secure content
Kohl The use of encryption in Kerberos for network authentication
US20080228650A1 (en) Secure communication and real-time watermarking using mutating identifiers
US20020019223A1 (en) System and method for secure trading mechanism combining wireless communication and wired communication
Zhang et al. Achieving non-repudiation of receipt
US6990468B1 (en) System, method and article of manufacture for cryptoserver-based auction
US7421583B1 (en) System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof
EP1175067B1 (de) Vorrichtung und Verfahren zur Verwaltung von Datentransmission in einem Datennetzwerk
US20240161104A1 (en) Method and system for performance enhanced hierarchical key distribution system
Evans et al. A payment mechanism for publish-subscribe systems
Venkataiahgari Secure e-commerce transactions for multicast services
JP2002099210A (ja) 情報管理方法及び情報通信装置

Legal Events

Date Code Title Description
AS Assignment

Owner name: BRITISH TELECOMMUICATIONS PUBLIC LIMITED COMPANY,

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FAIRMAN, IAN R.;BRISCOE, ROBERT J.;REEL/FRAME:010876/0797

Effective date: 19990201

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12